Chapter 10. Intrusion Detection System Concepts
On completing this chapter, you will be able to
Explain the main differences between the various IDSs
Describe host-based IDSs in detail
Describe network-based IDSs in detail
Explain how IDS management communication works
Describe IDS tuning
Explain how IDS maintenance works
This chapter builds on the introductory discussions of intrusion detection systems (IDSs) presented in Chapter 3, “Understanding Defenses.” This chapter delves into IDS concepts, uses, applications, and limitations. After the introduction to IDSs, their deployment and analysis are discussed in more detail. The concluding case study is a practical example of how organizations can inspect and monitor overall network activity using IDSs ...
Get Network Security Fundamentals now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.